首页 > 最新文献

International Journal of Safety and Security Engineering最新文献

英文 中文
Development of a Malicious Network Traffic Intrusion Detection System Using Deep Learning 基于深度学习的恶意网络流量入侵检测系统的开发
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130401
Olisaemeka F. Isife, Kennedy Okokpujie, Imhade P. Okokpujie, Roselyn E. Subair, Akingunsoye Adenugba Vincent, Morayo E. Awomoyi
With the exponential surge in the number of internet-connected devices, the attack surface for potential cyber threats has correspondingly expanded. Such a landscape necessitates the evolution of intrusion detection systems to counter the increasingly sophisticated mechanisms employed by cyber attackers. Traditional machine learning methods, coupled with existing deep learning implementations, are observed to exhibit limited proficiency due to their reliance on outdated datasets. Their performance is further compromised by elevated false positive rates, decreased detection rates, and an inability to efficiently detect novel attacks. In an attempt to address these challenges, this study proposes a deep learning-based system specifically designed for the detection of malicious network traffic. Three distinct deep learning models were employed: Deep Neural Networks (DNN), Long Short-Term Memory (LSTM), and Gated Recurrent Units (GRU). These models were trained using two contemporary benchmark intrusion detection datasets: the CICIDS 2017 and the Coburg Intrusion Detection Data Sets (CIDDS). A robust preprocessing procedure was conducted to merge these datasets based on common and essential features, creating a comprehensive dataset for model training. Two separate experimental setups were utilized to configure these models. Among the three models, the LSTM displayed superior performance in both experimental configurations. It achieved an accuracy of 98.09%, a precision of 98.14%, an F1-Score of 98.09%, a True Positive Rate (TPR) of 98.05%, a True Negative Rate (TNR) of 99.69%, a False Positive Rate (FPR) of 0.31%, and a False Negative Rate (FNR) of 1.95%.
随着联网设备数量呈指数级增长,潜在网络威胁的攻击面也相应扩大。这种情况要求入侵检测系统的发展,以应对网络攻击者所采用的日益复杂的机制。传统的机器学习方法,加上现有的深度学习实现,由于依赖过时的数据集,被观察到表现出有限的熟练程度。由于假阳性率升高、检测率下降以及无法有效检测新型攻击,它们的性能进一步受到损害。为了应对这些挑战,本研究提出了一种专门用于检测恶意网络流量的基于深度学习的系统。采用了三种不同的深度学习模型:深度神经网络(DNN)、长短期记忆(LSTM)和门控循环单元(GRU)。这些模型使用两个当代基准入侵检测数据集进行训练:CICIDS 2017和Coburg入侵检测数据集(CIDDS)。基于共同特征和基本特征,对这些数据集进行鲁棒预处理,创建一个全面的数据集用于模型训练。使用两个单独的实验装置来配置这些模型。在三种模型中,LSTM在两种实验配置下都表现出较好的性能。准确率为98.09%,精密度为98.14%,F1-Score为98.09%,真阳性率(TPR)为98.05%,真阴性率(TNR)为99.69%,假阳性率(FPR)为0.31%,假阴性率(FNR)为1.95%。
{"title":"Development of a Malicious Network Traffic Intrusion Detection System Using Deep Learning","authors":"Olisaemeka F. Isife, Kennedy Okokpujie, Imhade P. Okokpujie, Roselyn E. Subair, Akingunsoye Adenugba Vincent, Morayo E. Awomoyi","doi":"10.18280/ijsse.130401","DOIUrl":"https://doi.org/10.18280/ijsse.130401","url":null,"abstract":"With the exponential surge in the number of internet-connected devices, the attack surface for potential cyber threats has correspondingly expanded. Such a landscape necessitates the evolution of intrusion detection systems to counter the increasingly sophisticated mechanisms employed by cyber attackers. Traditional machine learning methods, coupled with existing deep learning implementations, are observed to exhibit limited proficiency due to their reliance on outdated datasets. Their performance is further compromised by elevated false positive rates, decreased detection rates, and an inability to efficiently detect novel attacks. In an attempt to address these challenges, this study proposes a deep learning-based system specifically designed for the detection of malicious network traffic. Three distinct deep learning models were employed: Deep Neural Networks (DNN), Long Short-Term Memory (LSTM), and Gated Recurrent Units (GRU). These models were trained using two contemporary benchmark intrusion detection datasets: the CICIDS 2017 and the Coburg Intrusion Detection Data Sets (CIDDS). A robust preprocessing procedure was conducted to merge these datasets based on common and essential features, creating a comprehensive dataset for model training. Two separate experimental setups were utilized to configure these models. Among the three models, the LSTM displayed superior performance in both experimental configurations. It achieved an accuracy of 98.09%, a precision of 98.14%, an F1-Score of 98.09%, a True Positive Rate (TPR) of 98.05%, a True Negative Rate (TNR) of 99.69%, a False Positive Rate (FPR) of 0.31%, and a False Negative Rate (FNR) of 1.95%.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135420780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments 用于安全物联网和区块链环境的多轮零知识证明算法
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130408
Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy
Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.
本文提出了一种用于多轮零知识证明(ZKP)的新算法,专门用于各种密码学应用中的认证分解证明。这种先进的算法在将计算复杂度保持在可接受范围内的同时,提供了一种安全而熟练的解决方案。该算法的功能由证明者和验证者之间的多轮交互来标记。最初,证明程序生成一个随机值并计算承诺。随后,验证者发出随机挑战,从证明者那里得到计算后的响应。为了验证证明,验证者验证承诺和计算响应是否相等。在不同的输入大小和参数下,证明了所提出的多轮ZKP算法的有效性。结果表明,平均成功率超过90%,显示了该方法的鲁棒性。验证者和证明者之间的重复交互增强了证明者的身份验证,从而提高了算法的可靠性。该算法的实现可以通过标准的加密工具和协议来实现,可以加强多种加密应用的安全性。在数字身份管理系统(DIMS)中可以找到一个重要的应用。目前,这些系统容易受到各种威胁的攻击,包括身份欺骗、数据泄露和内部安全风险。ZKP算法的应用可以同时增强安全性和保留敏感信息,潜在地改变DIMS的安全环境。未来的研究可以集中在提高多轮ZKP算法的效率和可扩展性上。在各种加密领域中探索这种技术的其他应用仍然有很大的潜力。
{"title":"A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments","authors":"Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy","doi":"10.18280/ijsse.130408","DOIUrl":"https://doi.org/10.18280/ijsse.130408","url":null,"abstract":"Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety Leadership and Performance in Indonesia’s Construction Sector: The Role of Project Owners’ Marurity 印尼建筑行业的安全领导和绩效:项目业主安全的作用
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130405
Desiderius V. Indrayana, Krishna S. Pribadi, Puti F. Marzuki, Hardianto Iridiastadi
The construction sector in Indonesia witnesses a significant number of work accidents, with construction sites being particularly prone to such incidents. It is imperative for stakeholders, especially project owners, to prioritize safety performance. The authorization of safety plans empowers project owners, granting them substantial influence over safety outcomes. This research employs Structural Equation Modeling (SEM) to investigate the relationship between project owners' safety leadership and safety performance, with valuable input obtained from contractors who directly interact with project owners. The identified variables encompass leader's maturity attributes, psychosocial factors, participatory approaches, communication practices, and competence levels. All interrelationships between the variables demonstrate high significance in shaping safety performance (with z-scores exceeding 1.96). Two distinct patterns are identified to characterize project owners' leadership styles. The first pattern relates to the personal maturity of the owner, while the second pattern focuses on the owner's ability to foster effective stakeholder relationships. To manifest maturity, project owners must make three key contributions: 1) ensuring safety costs are factored into the project value, 2) procuring contractors with well-defined safety policies, and 3) ensuring swift responses to accidents. These findings underscore the importance of project owners in enhancing construction safety practices, emphasizing their role beyond that of contractors.
印度尼西亚的建筑部门发生了大量的工作事故,建筑工地特别容易发生这类事故。利益相关者,特别是项目所有者,必须优先考虑安全性能。安全计划的授权赋予项目所有者权力,使他们能够对安全结果产生重大影响。本研究采用结构方程模型(SEM)来研究项目业主的安全领导与安全绩效之间的关系,并从与项目业主直接互动的承包商那里获得了有价值的投入。确定的变量包括领导者的成熟度属性、社会心理因素、参与方式、沟通实践和能力水平。所有变量之间的相互关系在形成安全性能方面都表现出很高的显著性(z-score超过1.96)。确定了两种不同的模式来表征项目所有者的领导风格。第一种模式与所有者的个人成熟度有关,而第二种模式侧重于所有者培养有效的利益相关者关系的能力。为了体现成熟度,项目所有者必须做出三个关键贡献:1)确保将安全成本考虑到项目价值中,2)采购具有明确安全政策的承包商,以及3)确保对事故的快速反应。这些发现强调了项目业主在加强建筑安全实践方面的重要性,强调了他们在承包商之外的作用。
{"title":"Safety Leadership and Performance in Indonesia’s Construction Sector: The Role of Project Owners’ Marurity","authors":"Desiderius V. Indrayana, Krishna S. Pribadi, Puti F. Marzuki, Hardianto Iridiastadi","doi":"10.18280/ijsse.130405","DOIUrl":"https://doi.org/10.18280/ijsse.130405","url":null,"abstract":"The construction sector in Indonesia witnesses a significant number of work accidents, with construction sites being particularly prone to such incidents. It is imperative for stakeholders, especially project owners, to prioritize safety performance. The authorization of safety plans empowers project owners, granting them substantial influence over safety outcomes. This research employs Structural Equation Modeling (SEM) to investigate the relationship between project owners' safety leadership and safety performance, with valuable input obtained from contractors who directly interact with project owners. The identified variables encompass leader's maturity attributes, psychosocial factors, participatory approaches, communication practices, and competence levels. All interrelationships between the variables demonstrate high significance in shaping safety performance (with z-scores exceeding 1.96). Two distinct patterns are identified to characterize project owners' leadership styles. The first pattern relates to the personal maturity of the owner, while the second pattern focuses on the owner's ability to foster effective stakeholder relationships. To manifest maturity, project owners must make three key contributions: 1) ensuring safety costs are factored into the project value, 2) procuring contractors with well-defined safety policies, and 3) ensuring swift responses to accidents. These findings underscore the importance of project owners in enhancing construction safety practices, emphasizing their role beyond that of contractors.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing and Mitigating Seismic Risk for a Hospital Structure in Zaruma, Ecuador: A Structural and Regulatory Evaluation 评估和减轻厄瓜多尔扎鲁玛医院结构的地震风险:结构和监管评估
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130402
Pedro P. Rojas, Cindy Moya, Martha Caballero, Wilmer Márquez, Josué Briones-Bitar, Fernando Morante-Carballo
This research, conducted in Zaruma, southern Ecuador, seeks to evaluate the seismic vulnerability and performance level of the Humberto Molina Hospital's reinforced concrete buildings. The study employs an examination of national and international seismic codes for rehabilitation, along with the implementation of recommended techniques. Structural characteristics of the buildings were identified through auscultation, surveys of reinforcing steel, and the extraction of concrete cores. The amassed data, coupled with a seismic hazard analysis of the site, facilitated a structural assessment of the blocks, conducted in accordance with national (MIDUVI) and international (ASCE/SEI) codes. The Federal Emergency Management Agency (FEMA) subsequently proposed rehabilitation alternatives for each block. Due to the importance of the hospital's functions, data collection was limited to blocks B3 and B4. The structural system, composed of moment-resisting concrete frames, exhibits potential vulnerabilities due to knocking (collision) and torsion, attributed to its irregular form. Structural evaluation revealed that block B4 adheres to the drift limits stipulated by the ASCE 41-13 standard (below 2%), while block B3 exceeds these limits (2.05-2.80%). Recommended rehabilitation strategies for B3 encompass mass reduction (removal of the second floor, representing a dead load of 700kg/m 2 and a live load of 200kg/m 2 ), and the introduction of additional rigidity and strength (extension of structural elements). For block B4, it is suggested that each sub-block be made independent. These interventions aim to facilitate the hospital's reopening, thereby benefiting the Zaruma Mining District community.
{"title":"Assessing and Mitigating Seismic Risk for a Hospital Structure in Zaruma, Ecuador: A Structural and Regulatory Evaluation","authors":"Pedro P. Rojas, Cindy Moya, Martha Caballero, Wilmer Márquez, Josué Briones-Bitar, Fernando Morante-Carballo","doi":"10.18280/ijsse.130402","DOIUrl":"https://doi.org/10.18280/ijsse.130402","url":null,"abstract":"This research, conducted in Zaruma, southern Ecuador, seeks to evaluate the seismic vulnerability and performance level of the Humberto Molina Hospital's reinforced concrete buildings. The study employs an examination of national and international seismic codes for rehabilitation, along with the implementation of recommended techniques. Structural characteristics of the buildings were identified through auscultation, surveys of reinforcing steel, and the extraction of concrete cores. The amassed data, coupled with a seismic hazard analysis of the site, facilitated a structural assessment of the blocks, conducted in accordance with national (MIDUVI) and international (ASCE/SEI) codes. The Federal Emergency Management Agency (FEMA) subsequently proposed rehabilitation alternatives for each block. Due to the importance of the hospital's functions, data collection was limited to blocks B3 and B4. The structural system, composed of moment-resisting concrete frames, exhibits potential vulnerabilities due to knocking (collision) and torsion, attributed to its irregular form. Structural evaluation revealed that block B4 adheres to the drift limits stipulated by the ASCE 41-13 standard (below 2%), while block B3 exceeds these limits (2.05-2.80%). Recommended rehabilitation strategies for B3 encompass mass reduction (removal of the second floor, representing a dead load of 700kg/m 2 and a live load of 200kg/m 2 ), and the introduction of additional rigidity and strength (extension of structural elements). For block B4, it is suggested that each sub-block be made independent. These interventions aim to facilitate the hospital's reopening, thereby benefiting the Zaruma Mining District community.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the SIR Model: Isolation and Containment Strategies for COVID-19 - A Case Study of Ain-Touta City 改进SIR模型:新冠肺炎的隔离和遏制策略——以Ain-Touta市为例
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130418
Assia Aouachria, Moussa Anoune, Soraya Yebbal, Zeroual Aouachria
In the endeavor to halt the transmission of infectious diseases, containment and isolation emerge as pivotal preventive strategies. The elucidation of disease spread dynamics, through the lens of mathematical models, is instrumental in forecasting epidemiological trajectories. This study presents an augmented Susceptible-Infected-Recovered (SIR) model, assimilating these preventive measures, to scrutinize the propagation of COVID-19 since its initial emergence. The combat against this pandemic has predominantly hinged upon non-pharmaceutical interventions (NPIs) including, but not limited to, mask utilization, physical distancing, patient isolation, contact quarantine, and hand hygiene. The focal point of our investigation lies in the examination of the influence of susceptible population containment and infected individual isolation on the evolution of the ongoing outbreak. The basic reproductive number, an indicator of contagiousness, is analyzed over the course of the outbreak, yielding promising outcomes.
在制止传染病传播的努力中,遏制和隔离成为关键的预防战略。通过数学模型的镜头阐明疾病传播动态,有助于预测流行病学轨迹。本研究提出了一个增强的易感-感染-恢复(SIR)模型,吸收了这些预防措施,以仔细检查COVID-19自最初出现以来的传播。抗击这场大流行的斗争主要依赖于非药物干预措施,包括但不限于使用口罩、保持身体距离、隔离患者、接触者隔离和手卫生。我们调查的重点是检查控制易感人群和隔离受感染个体对当前疫情演变的影响。作为传染性指标的基本繁殖数在疫情期间进行了分析,得出了有希望的结果。
{"title":"Improving the SIR Model: Isolation and Containment Strategies for COVID-19 - A Case Study of Ain-Touta City","authors":"Assia Aouachria, Moussa Anoune, Soraya Yebbal, Zeroual Aouachria","doi":"10.18280/ijsse.130418","DOIUrl":"https://doi.org/10.18280/ijsse.130418","url":null,"abstract":"In the endeavor to halt the transmission of infectious diseases, containment and isolation emerge as pivotal preventive strategies. The elucidation of disease spread dynamics, through the lens of mathematical models, is instrumental in forecasting epidemiological trajectories. This study presents an augmented Susceptible-Infected-Recovered (SIR) model, assimilating these preventive measures, to scrutinize the propagation of COVID-19 since its initial emergence. The combat against this pandemic has predominantly hinged upon non-pharmaceutical interventions (NPIs) including, but not limited to, mask utilization, physical distancing, patient isolation, contact quarantine, and hand hygiene. The focal point of our investigation lies in the examination of the influence of susceptible population containment and infected individual isolation on the evolution of the ongoing outbreak. The basic reproductive number, an indicator of contagiousness, is analyzed over the course of the outbreak, yielding promising outcomes.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities 利用安全建模和信息系统审计来减轻网络漏洞
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130420
Laberiano Andrade Arenas, Cesar Yactayo-Arias, Sheyla Rivera Quispe, Jenner Lavalle Sandoval
ABSTRACT
{"title":"Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities","authors":"Laberiano Andrade Arenas, Cesar Yactayo-Arias, Sheyla Rivera Quispe, Jenner Lavalle Sandoval","doi":"10.18280/ijsse.130420","DOIUrl":"https://doi.org/10.18280/ijsse.130420","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SE-CDR: Enhancing Security and Efficiency of Key Management in Internet of Energy Consumer Demand-Response Communications SE-CDR:提高能源消费者需求响应通信互联网密钥管理的安全性和效率
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130403
Mourad Benmalek, Kamel Harkat, Kamel-Dine Haouam, Zakaria Gheid
ABSTRACT
{"title":"SE-CDR: Enhancing Security and Efficiency of Key Management in Internet of Energy Consumer Demand-Response Communications","authors":"Mourad Benmalek, Kamel Harkat, Kamel-Dine Haouam, Zakaria Gheid","doi":"10.18280/ijsse.130403","DOIUrl":"https://doi.org/10.18280/ijsse.130403","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification 利用人工智能和机器学习加强网络取证:自动威胁分析和分类研究
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130412
Bandr Fakiha
The escalating frequency and complexity of cyber-attacks have necessitated the development of effective cyber forensic investigation techniques. This research investigates the utilization of machine learning and artificial intelligence (AI) in automated analysis and classification of cyber threats, aiming to enhance the understanding of their role in cyber forensics. Employing case studies, observations, and surveys, information was gathered from forensic investigators and cybersecurity experts. The case studies comprehensively examine organizations that have implemented AI and machine learning in cyber forensics. Observational methods involve attending conferences and closely observing investigators during forensic analysis. Survey data from forensic investigators and cybersecurity experts were collected to gain insights into the application of these novel investigation methods in cyber forensics. The findings demonstrate that AI and machine learning are emerging as powerful tools for augmenting cyber forensic investigations, particularly in the realms of threat detection and classification. The case studies reveal that businesses adopting these technologies have experienced notable improvements in the efficiency and precision of forensic investigations. This study underscores the potential advantages of integrating artificial intelligence and machine learning in advancing digital forensic investigations and provides valuable insights into their roles in cyber forensics. Accelerated analytical procedures and enhanced threat detection capabilities are evident outcomes of incorporating these technologies. By leveraging AI and machine learning, investigations can be expedited, enabling prompt responses to cyber threats and reducing overall risk exposure for businesses. As the cybersecurity landscape continues to evolve, the successful integration of AI and machine learning in the industry holds the promise of ushering in a new era of proactive threat detection, bolstering organizations' capacity to safeguard digital assets.
{"title":"Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification","authors":"Bandr Fakiha","doi":"10.18280/ijsse.130412","DOIUrl":"https://doi.org/10.18280/ijsse.130412","url":null,"abstract":"The escalating frequency and complexity of cyber-attacks have necessitated the development of effective cyber forensic investigation techniques. This research investigates the utilization of machine learning and artificial intelligence (AI) in automated analysis and classification of cyber threats, aiming to enhance the understanding of their role in cyber forensics. Employing case studies, observations, and surveys, information was gathered from forensic investigators and cybersecurity experts. The case studies comprehensively examine organizations that have implemented AI and machine learning in cyber forensics. Observational methods involve attending conferences and closely observing investigators during forensic analysis. Survey data from forensic investigators and cybersecurity experts were collected to gain insights into the application of these novel investigation methods in cyber forensics. The findings demonstrate that AI and machine learning are emerging as powerful tools for augmenting cyber forensic investigations, particularly in the realms of threat detection and classification. The case studies reveal that businesses adopting these technologies have experienced notable improvements in the efficiency and precision of forensic investigations. This study underscores the potential advantages of integrating artificial intelligence and machine learning in advancing digital forensic investigations and provides valuable insights into their roles in cyber forensics. Accelerated analytical procedures and enhanced threat detection capabilities are evident outcomes of incorporating these technologies. By leveraging AI and machine learning, investigations can be expedited, enabling prompt responses to cyber threats and reducing overall risk exposure for businesses. As the cybersecurity landscape continues to evolve, the successful integration of AI and machine learning in the industry holds the promise of ushering in a new era of proactive threat detection, bolstering organizations' capacity to safeguard digital assets.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ultra-Lightweight Encryption for STL Files in IoT-based 3D Printing 基于物联网的3D打印中STL文件的超轻量级加密
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130407
Nilufar Yasmin, Richa Gupta
{"title":"Ultra-Lightweight Encryption for STL Files in IoT-based 3D Printing","authors":"Nilufar Yasmin, Richa Gupta","doi":"10.18280/ijsse.130407","DOIUrl":"https://doi.org/10.18280/ijsse.130407","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135387185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Cyberbullying on Social Media Using Support Vector Machine: A Case Study on Twitter 使用支持向量机检测社交媒体上的网络欺凌:以Twitter为例
Q3 Engineering Pub Date : 2023-09-28 DOI: 10.18280/ijsse.130413
None Al-Khowarizmi, Indah Purnama Sari, Halim Maulana
ABSTRACT
{"title":"Detecting Cyberbullying on Social Media Using Support Vector Machine: A Case Study on Twitter","authors":"None Al-Khowarizmi, Indah Purnama Sari, Halim Maulana","doi":"10.18280/ijsse.130413","DOIUrl":"https://doi.org/10.18280/ijsse.130413","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Safety and Security Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1